Sweet32-Vulnerability/EN/Background: Unterschied zwischen den Versionen

Aus Siwecos
Wechseln zu: Navigation, Suche
 
Zeile 1: Zeile 1:
[https://en.wikipedia.org/wiki/Sweet32 Sweet32] is the name of an attack that was carried out by researchers on the French Institute for Research in Computer Science and Automation (INRIA). The attack exploits design flaws in some encryption algorithms. These encryption algorithms are used in widely used protocols such as [https://en.wikipedia.org/wiki/Transport_Layer_Security TLS], SSH, IPsec and OpenVPN. The Sweet32 attack allows an attacker under some circumstances to restore small sections of a test if it was encoded with 64-bit block ciphers (such as Triple-DES and Blowfish).
+
The attack exploits 64-bit block ciphers. The Sweet32 attack allows an attacker, under certain circumstances, to recover small pieces of text when encrypted with 64-bit block ciphers (such as 3DES). The attack is not very easy to perform, so the threat is limited.

Aktuelle Version vom 11. Juni 2019, 12:28 Uhr

The attack exploits 64-bit block ciphers. The Sweet32 attack allows an attacker, under certain circumstances, to recover small pieces of text when encrypted with 64-bit block ciphers (such as 3DES). The attack is not very easy to perform, so the threat is limited.